Hayikader et al., 2016 - Google Patents
Issues and security measures of mobile banking appsHayikader et al., 2016
View PDF- Document ID
- 13405357404393606837
- Author
- Hayikader S
- Hadi F
- Ibrahim J
- Publication year
- Publication venue
- International Journal of Scientific and Research Publications
External Links
Snippet
Mobile apps is a used to designate the act or process by which application software is developed for handheld devices, such as personal digital assistants or mobile phones. These applications can be pre-installed on phones during manufacturing platforms, or …
- 238000000034 method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Badotra et al. | A systematic review on security of E-commerce systems | |
Thakur et al. | Cloud computing and its security issues | |
US10397187B2 (en) | Blocking automated attacks with forced user interaction | |
Hayikader et al. | Issues and security measures of mobile banking apps | |
Alsayed et al. | E-banking security: Internet hacking, phishing attacks, analysis and prevention of fraudulent activities | |
Kaushik et al. | Security and privacy in IoT based e-business and retail | |
Yoo et al. | Case study of the vulnerability of OTP implemented in internet banking systems of South Korea | |
He et al. | Examining Security Risks of Mobile Banking Applications through Blog Mining. | |
Wright et al. | Cyber security and mobile threats: The need for antivirus applications for smart phones | |
Briones et al. | Review of the main security problems with multi-agent systems used in e-commerce applications | |
Hyslip | Cybercrime-as-a-service operations | |
Bosamia | Mobile wallet payments recent potential threats and vulnerabilities with its possible security measures | |
Urs | SECURITY ISSUES AND SOLUTIONS IN E-PAYMENT SYSTEMS. | |
Ojugo et al. | Social engineering detection model for mobile smartphone clients | |
Nwogu et al. | Security issues analysis on online banking implementations in Nigeria | |
Afaq et al. | A critical analysis of cyber threats and their global impact | |
Sarjiyus et al. | Improved online security framework for e-banking services in Nigeria: A real world perspective | |
Hossain et al. | Classifying cyberattacks on financial organizations based on publicly available deep web dataset | |
Saha et al. | Review of considerations for mobile device based secure access to financial services and risk handling strategy for CIOs, CISOs and CTOs | |
Hutchings et al. | Criminals in the cloud: Crime, security threats, and prevention measures | |
Ngalo et al. | Threat analysis of software agents in online banking and payments | |
Ghazizadeh et al. | Secure OpenID authentication model by using Trusted Computing | |
Abdulla et al. | Consumer use of E-banking in Iraq: Security breaches and offered solution | |
Daswani et al. | Technology defenses to fight the root causes of breach: Part One | |
Williams et al. | Follow the Money Through Apple Pay |